security update

Sergei Glazunov discovered a heap-based buffer overflow vulnerability in the handling of embedded PNG bitmaps in FreeType. Opening malformed fonts may result in denial of service or the execution of arbitrary code.

For the stable distribution (buster), this problem has been fixed in version 2.9.1-3+deb10u2.

We recommend that you upgrade your freetype packages.

For the detailed security status of freetype please refer to its security tracker page at: \ https://security-tracker.debian.org/tracker/freetype

# do not modify the following line #include "$(ENGLISHDIR)/security/2020/dsa-4777.data" # $Id: $